CVE-2005-0102 in GNOME and Debian Products
Published on January 24, 2005
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
NVD
Products Associated with CVE-2005-0102
stack.watch emails you whenever new vulnerabilities are published in GNOME Evolution or Debian Linux. Just hit a watch button to start following.
Exploit Probability
EPSS
0.60%
Percentile
69.05%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.